Playlist

European Identity and Cloud Conference 2022

190 videos in this playlist
Event Recording
Impressions from the European Identity and Cloud Conference 2022
May 17, 2022
Event Recording
Attendees at the European Identity and Cloud Conference 2022
May 17, 2022
Event Recording
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
May 13, 2022
In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a pluralistic digital society & business world where size would not be the only thing that matters. To get there, we need open Standards, Protocols and Alliances that help individuals, as well as businesses of any size, to participate in a digital future inside the metaverse and beyond - just like trade unions helped the working class during the industrial revolution to fight for their rights. In this...
Event Recording
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
May 13, 2022
Widely used cloud security standards define general security measures/controls for securing clouds while not differentiating between the many, well-known implementations that differ with respect to the Service and/or Deployment Model they implement. Users are thus lacking guidance for decision-making and for preparing to ensure end-to-end security. By adding only two requirements, cloud security standards can really cover and consider virtually all possible Service Models and Deployment Models. As a result of this, they support differentiating between offerings and improve the support for...
Event Recording
Panel | Decentralized, Global, Human-Owned. The Role of IDM in an Ideal (If there is One) Web3 World
May 13, 2022
The Internet had been created without an identity layer, leaving it to websites and applications to take care for authentication, authorization, privacy and access. We all know the consequences - username and password still being the dominant paradigm and, even more important, users not having control over information that personally identifies them. The risk of data misuse, of being hacked or manipulated has become a significant challenge and and requires a new approach in times of an emerging web3 and its core capability of transferring value. Is decentralized, DLT based Identity the...
Event Recording
Enabling Digital Identity Ecosystems
May 13, 2022
Event Recording
In Transition - From Platforms to Protocols
May 13, 2022
Only a few years ago the identity ecosystem seemed to be ‘set’ with little chance for change or dislocation of the large federated identity providers. Today the entire identity technology ecosystem is in flux. What will emerge? OIDC? OIDC/SIOP? DIDComm? Join us for a discussion on the changing protocol landscape, the shifting identity power centers and why it is a both/and and not either/or.
Event Recording
Insights from India’s Data Empowerment & Protection Architecture
May 13, 2022
Event Recording
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!
May 13, 2022
Event Recording
Cyber-Securing the Digital Industry
May 13, 2022
Event Recording
Trust is a Team Sport, and Like all Good Sports it has Rules
May 13, 2022
Trust is not just technical, and it’s not just derived from a process or an organisation. The need for Trust is also variable based on the risk involved in a transaction or the risk appetite of the service provider. Sometimes trust is almost irrelevant. Digital doesn’t make things any easier as we often have multiple parties involved in the communication of trust from issuer to holder of credentials, and on to a relying service not to mention requirements for onboarding, verification, issuance, and authentication to name but a few along the way. Emerging standards and...
Event Recording
Privacy = Data Protection + X
May 13, 2022
Data Protection is a very basic and profound concept of translating privacy as a human right into the digital sphere. But is it enough? and are our current approaches the right ones? In this panel we will try to find answers on how we can translate privacy into the (metaverse) future.
Event Recording
Solving "The Right to be Forgotten" for Blockchains
May 13, 2022
"The Right to be Forgotten" presents a conundrum to builders of blockchain solutions, because the focus of most blockchains is to create an indelible, permanent record. This makes "The Right to be Forgotten" appear irreconcilable with blockchains. I will present a solution to "The Right to be Forgotten" that can be applied to most every blockchain, subject to governance approval by the stakeholders. The solution does not violate the integrity of the blockchain record.
Event Recording
Global AI Ethics and Governance
May 13, 2022
Recent years have seen significant Artificial Intelligence (AI) development across all domains of business and society. This panel aims to bring attention to societal impacts of AI – benefits and challenges, by bringing thought leaders and practitioners from different parts of the world to leverage diverse viewpoints around AI governance that continue to drive AI development across borders.
Event Recording
Reducing Complexity - Increasing Agility: How to Deliver Value With Hybrid & Multi-Clouds
May 13, 2022
Event Recording
Reducing the Species in your Cybersecurity Zoo
May 13, 2022
Event Recording
"The Great Resignation" Combined with an Explosion in IT Complexity - How Can IT Weather this Perfect Storm?
May 13, 2022
Event Recording
Knowing differences between Cyber Resistance and Cyber Resilience
May 13, 2022
You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this presentation, we will be understanding the differences between Cyber Resistance and Cyber resilience, and how we can apply both concepts to our current technology landscape, besides understanding how we can identify the High-Value Target (HVT) in our organization
Event Recording
The impact of decentralized identity solutions in the marketplace, insights and lessons
May 13, 2022
Long theorized as the solution to the verification problem on the internet, decentralized identity has now achieved lift-off in the marketplace. In this workshop, we’ll explain who’s interested, why, and what we learned building a series of solutions for global enterprises in the finance, health, and travel sectors. We’ll explain how we implement decentralized identity through the concept of a Trusted Data Ecosystem, and what the near future looks like for businesses who adopt this technology now, including the critical importance of verifiable digital identity to...
Event Recording
Closing Keynote & Announcement of EIC 2022 Gamification Winners
May 13, 2022
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
May 13, 2022
Event Recording
OT Patch Management Best Practices
May 13, 2022
Event Recording
Navigating the OT World – Selecting a Solution to Suit
May 13, 2022
Event Recording
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
May 13, 2022
Ethical Hacker Joseph Carson will demonstrate a real-world use case of how a cyber adversary gains an initial foothold in your network through compromised credentials and then elevates control and moves laterally to identify and exfiltrate your critical data. He will share insights into how the mind of a criminal hacker operates based on his experiences and steps you can take to stop them in their tracks. Staying up to date and learning hacking techniques is one of the best ways to know how to defend your organization from cyber threats. Hacking gamification is on the rise to help keep...
Event Recording
Creating a Seamless Access Experience with the Digital Double
May 12, 2022
Today, seamless access experiences are crafted based on identity fundamentals such as single sign-on, multi-factor authentication, passwordless authentication, self-service portals, and federated access. But, is this enough for the next epoch of digital applications, metaverse, and Web 3.0?  The digital world is a  replication of the physical world in a digital ecosystem. As a result, people and things have an equal digital representation, which we call a digital double . In this keynote, Asanka will look at creating a seamless access experience around the digital double...
Event Recording
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
May 12, 2022
Event Recording
Digital Identity in Travel (and beyond): a public-private affair
May 12, 2022
Event Recording
Interoperability Between Global Identity Networks
May 12, 2022
Event Recording
Human-Centric Identity
May 12, 2022
Security vs experience. Platform vs best of breed. Fast vs thorough. The identity technology world forces us to make trade-offs. These difficult decisions are an endless exercise in technical and logistical nuances like developer and IT resources, product licenses, integrations, and deployment methods.  Get ready! We are entering an era where IAM professionals can rise above those tradeoffs, and rapidly evolve from technical experts to experience artists by using solutions that customize, code, and integrate for you. This means humans can focus on what humans do best: creating...
Event Recording
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
May 12, 2022
We are in the mid of one of the most significant revolutions in the cloud and identity ecosystem since the last decade. With the dynamic transformation from Web2.0 to Web3.0, both the cloud as well as the identity ecosystem embrace themselves for a change in the way we perceived security. Blockchain is revolutionizing both the cloud industry as well as the financial sectors. In my talk, I will focus on the transformative impact of blockchain protocols like Filecoin and Storj which are playing a significant role in changing the way we have perceived cloud storage. Decentralized Cloud...
Event Recording
The Balance Between Decentralization and Efficiency
May 12, 2022
Currently, lots of topics are fast-moving in crypto. There is still a gap to be closed between non-crypto businesses and the application of blockchain technology. It is PolyCrypt's vision to realize the true power of decentralization – bringing privacy, speed, scalability and user freedom to the masses – as a frontier of innovation we passionately strive for excellence with no compromise on quality.
Event Recording
Designing an European Identity Wallet: An overview of UI and UX aspects
May 12, 2022
The European Identity Wallet will be made available to all Europeans by the different Member states as part of the revised eIDAS regulation. In this talk Adrian Doerk will provide an overview of how a potential user interface (UI) might look like and will illustrate common challenges when designing customer centric user experience (UX) flows within the wallet. 
Event Recording
IGA in the Financial Industry - Implementing IAM
May 12, 2022
Field report from a compliance-driven implementing of a full-blown IGA system at a German finance corporation.
Event Recording
Drivers for Identity & Access Management in the Financial Industries
May 12, 2022
Identity & Access Management is a key requirement from banning regulations. At Creditplus, a new IAM solution was implemented recently. Drivers for IAM as well as the overall design of the new solutions are presented in this talk.
Event Recording
Bridging Traditional IGA with Cloud Native Authorization
May 12, 2022
IGA vendors often point to ABAC vendors when asked how authorization should actually be enforced and ABAC vendors point in the direction of IGA vendors when asked where all that context information is coming from. The talk will shed some light on how the grey area between IGA and cloud native authorization systems like Styra DAS / Open Policy Agent can be bridged. The focus will be on inhouse applications not on commercial off the shelf software as bolting a foreign authorization system onto existing software brings little benefit. We will share where different concerns like auditability,...
Event Recording
Latest Developments in CIAM
May 12, 2022
Consumer identity is still a hot topic in IAM in general. CIAM has experienced a great deal of technological innovation in the last five years, and much of the innovation in CIAM has found its way into B2B and B2E IAM solutions through the "consumerization of IT". KuppingerCole is updating research on CIAM, and in this session we'll consider what we have learned thus far, including trends in authenticator availability and usage, consent and privacy management features, regulatory compliance developments, the integration of consumers' device identities, the challenges of account recovery...
Event Recording
Protocol Independent Data Standards for Interoperability
May 12, 2022
Event Recording
Panel | CIAM and Customer Data Platforms
May 12, 2022
Event Recording
Cyber Security Architectures in a Hybrid World
May 12, 2022
A practical approach to cyber security architectures: In a hybrid ecosystem we have not only to find a suitable security model for IT but also for OT like in production environments. And after all cloud services are adding another dimension of complexity. We will take a short look at the security basics, compare some outdated, updated and up-to-date security models finding suitable models for IT-security, OT-security and cloud-security. Finally we will put it all together in combined scenarios. This presentation will focus on practical security architecture rather than on formal...
Event Recording
Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
May 12, 2022
This presentation will explore adding deception as a component of a security-in-depth strategy to increase cyber resilience (in case the garlic, crosses, and wooden stakes are not effective). We will discuss whether you should invite attackers into your network. Much like with vampires, inviting attackers in can have serious repercussions. However, unlike vampires, cyber attackers do not need an invitation. Fortunately, deception within our networks can aid in identifying, delaying, and evicting unwanted guests, including insider threats (or vampires already amongst us). We will explore...
Event Recording
The Unique Challenges of Identity M&A in High-Growth Organizations
May 12, 2022
Mergers and acquisitions amongst large, globally-distributed organizations are notoriously complex, error-prone, and resource consuming. But did you know that merging smaller organizations comes with its own set of unique issues and risks? One year ago, Okta announced its acquisition of Auth0. Since then, the combined forces of their internal business systems teams have been working hard to bring the identity and compliance capabilities of the organizations together. The union of these two companies introduced some novel challenges- even for veteran practitioners with experience in IAM...
Event Recording
Securely Identifying Mobile Apps
May 12, 2022
Today's open standards ensure that when a user chooses to login, the user’s authentication is protected and only delivered to the mobile app that initiated the authentication. However, how does the Authorization Server identify or verify the invoking app? This talk will look at the potential for mobile app impersonation and mechanisms available to protect against these attacks. Key takeaways: What’s needed to impersonate a mobile app How standards currently address this exposure Mechanisms to strongly identify a mobile app
Event Recording
Remote onboarding with Verifiable Credentials
May 12, 2022
Many companies are engaging in remote onboarding and need to adopt new methods of identity verification that can be done digitally. While new forms of ID verification are most prevalent today with Financial Services as a means of performing Know-Your-Customer regulations, there is nascent adoption across other industry verticals. In this session, the speakers will demonstrate an open standard based approach to ID verification based on verifiable credentials and decentralized identifiers for remote onboarding across industries. With this new approach users can verify their identity once and...
Event Recording
Implementing SSI using the existing web infrastructure
May 12, 2022
SSI and Verifiable Credentials are the latest development in identity management. They offer many benefits over existing federated identity management systems. Unfortunately some proponents of SSI are mandating that companies implement decentralised identifiers (DIDs) and blockchains in order to benefit from SSI. This is not necessary. In fact the W3C Verifiable Credentials Data Model Recommendation makes it clear that DIDs are not needed for verifiable credentials, and vice versa. DIDs and blockchains are something of a ball and chain around the legs of companies that want to benefit...
Event Recording
Verifiable Credentials on the front line
May 12, 2022
Learn how businesses are using verifiable credentials, decentralized orchestration and blockchain identity to reduce fraud, increase privacy and improve user experience. See real-world examples of production ready solutions from one state’s Department of Education and other public sector organizations. Learn how biometrics, proofing, KYC and other MFA services link with verifiable credentials through decentralized orchestration. See how paper-based documents like diplomas, academic transcripts and citizen identity are being replaced with verifiable credentials that reduce cost,...
Event Recording
Connecting 10.000+ mobility companies and multi million customers
May 12, 2022
Event Recording
How to innovate your Identity Governance and Administration program
May 12, 2022
The Holcim EMEA digital center has received the EMEA innovation award in 2021 from their IGA program.
Event Recording
Enterprise Domain Annotation based Segregation of Duties strategies
May 12, 2022
Event Recording
Panel | B2B IAM
May 12, 2022
Event Recording
Best Practice: CIAM as Business Enabler for Digital Transformation
May 12, 2022
Event Recording
Panel | How to improve customer IAM and CIAM
May 12, 2022
Event Recording
Signing in the Rain: HTTP Message Signatures and Web Security
May 12, 2022
HTTP is an amazingly powerful protocol, and it's the lifeblood of the internet today. On the surface, it seems to be a simple protocol: send a request to a server and get back a response, and everything's structured in useful ways. HTTPS adds the TLS protocol to secure the connections between endpoints, protecting the messages with encryption and keeping them away from attacker's eyes. But what if you want to be sure the sender is the right sender, and what you see is what they sent? What if you've got a more complex deployment, with proxies and gateways in between your endpoints that...
Event Recording
Privacy Enhancing Mobile Credentials
May 12, 2022
The Kantara Initiative is developing a standard and requirements so that organizations can demonstrate to their stakeholders that their commitments to privacy and data protection go beyond transactional and technical trust. At the end of the day people trust, or don't trust, organizations - not the technologies that the organizations use. This session will provide you with an up-to-date report on the development of these standards and requirements and also provide you with an opportunity to provide input into their development.
Event Recording
The SolarWinds Hack and the Executive Order on Cybersecurity Happened - It Is Time to Prepare
May 12, 2022
Again and again, I am asked how one can start with the topic of security in an agile project environment. What are the essential first steps, and what should you focus on at the beginning? Of course, this raises the question of suitable methodologies and tools. At the same time, the strategic orientation of the company must be included in this security strategy. We have also learned in the recent past that attacks like the “Solarwinds Hack” are becoming more and more sophisticated and that the attackers now focus on the entire value chain. What tools are there, and where...
Event Recording
Your Journey to the Cloud: Can you Finally Replace Active Directory?
May 12, 2022
In this session, we will answer a question that everyone is asking: "Can we really get rid of Active Directory in the cloud era?". In the conversations with many CISOs and CTOs, the future of Active Directory was constantly being questioned and we could see a lot of confusion about what strategy to take. Active Directory is currently experienced as a huge pain in most organizations and they all dream of being able to eliminate this classic entry point for Malware and Ransomware within their IT ecosystem.
Event Recording
Panel | The Future of Corporate Directories in the Cloud Era. Will they Survive?
May 12, 2022
In this session we will have a look at traditional corporate directy systems and discuss wether, how and where they will survive a cloud first stragey. Do we still need a corporate directory? If so, what are or will be their role compared to oter centralized directories like Azure AD? How would a migration path look like and which APIs have to be supported? How will HR, Corporate Directory and IAM plac together? Will Distributed Ledger based technology be a game changer?
Event Recording
The Identity R/Evolution
May 12, 2022
The identity r/evolution is ongoing. For a while it seemed that not much has changed since Kim Cameron spearheaded the discussion about “ The Laws of identity ”. New technologies like Privacy-ABC based on ZKP were ready to provide the user with control over how much personal data he wants to disclose, while promising, commercial solutions were neither accepted by the market nor solving the problem of reliability of transactions exhaustively. Today, the new decentralized digital identity model of Self-Sovereign Identity, utilizing verifiable credentials and Decentralized...
Event Recording
Credentials and Privacy - History and New Kinds of Cards
May 12, 2022
David will talk aboout a new technology that allows the person owning a public key to prove that they have memorized a passphrase, from which they could at any time easily compute the private key. One example use is for votexx.org elections, which are conducted remotely without polling places. The ballot-casting in such elections is done by a signature that is publicly verifiable as corresponding to a particular public key posted in advance by the election authority. The voter registration authority would require a proof that the voter knows the corresponding passphrase and hence ensures...
Event Recording
Panel | Turning (Distributed) Workforce Challenges into Productivity Gains
May 12, 2022
Customer Identity & Access Management (CIAM) has made us learn about reducing friction in the way customers access and consume our services, and to add value to the relationship. It is time now to apply CIAM learnings to workforce identity. 
Event Recording
Friends don’t let Friends Centralize Authorization Enforcement
May 12, 2022
Event Recording
Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks
May 12, 2022
Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been left on endpoints are a valuable target for attack. SAAS applications and Cloud access further expand the proliferation of potentially exposed identities. Once an attacker establishes initial access it becomes trivial for lateral attack movement to take control over critical systems or the entire network....
Event Recording
There is No Consensus About Consent
May 12, 2022
 
Event Recording
All Other Identities - The Risk That Is Hiding in Plain Sight
May 12, 2022
For the last 30 years  virtually every  company, agency and organization has been forced to accept the risks associated with identity management and control for third parties and  all  the other identities that  are not  directly addressed by today's workforce or customer access management solutions. The universe of  "all other identities"  is enormous, numbering in the billions and  maybe even the trillions of distinct and unique identities. In the absence of solutions and processes to actively manage and control the identities of contractors, service providers, agencies, franchisees and...
Event Recording
Qualified electronic signatures in times of the eIDAS2-wallet - a Nordic-Baltic perspective
May 12, 2022
When dealing with digital identity, emphasis is often put on the identification and authentication part. An equally important aspect is digital signing (or more broadly: electronic signing). Qualified electronic signatures have the same legal status as handwritten signatures in the EU. In this session, we shall look at the advantages and challenges that come with them from a Nordic-Baltic perspective. What is their role today and in the future; both independently, and in connection with the upcoming eIDAS2-wallet? Concrete use cases will be demonstrated from the point of view of the...
Event Recording
Kubernetes and Crossplane at Deutsche Bahn
May 12, 2022
This session will be about the journey of Kubernetes and Crossplane at Deutsche Bahn, to provide platform consumers with access to a unified API for deployments, infrastructure provisioning and applications in a manner that is independent from the cloud, addressing compliance and cross-cutting concerns while providing a Kubernetes "native" experience. The journey has not been without challenges, where the platform team has managed technical and functional requirements including an access model in an enterprise environment, user expectations of cloud native infrastructure usage, and...
Event Recording
Deploying Open Policy Agent (OPA) at Scale and in Production
May 12, 2022
OPA is a fast rising star in the Authz market. In this deep dive we will cover lessons learned and best practice from early adopters on how to deploy OPA at scale and in production. How can you ensure consistent polices, how do you test and life cycle policies, how do connect with external data sources.
Event Recording
Identity Management in a Web 3.0 World
May 12, 2022
The third iteration of the Web, Web 3, aims to put more control over web content in users’ hands. It promises to be built on blockchain, eliminating all big intermediaries, including centralized governing bodies. The vision for a Web3 world is for people to control their own data and be able to bounce around from social media to email to shopping using a single personalized account, creating a public record on the blockchain of all of that activity. What does this mean from an identity management point of view? We will explore some important questions that should be addressed as the...
Event Recording
An ecosystem for trusted identities
May 12, 2022
 
Event Recording
Enterprise Identity: A case study of the EU Gaia-X project
May 12, 2022
Gaia-X Federation Services is a European project that promotes innovation through data sharing and represents the next generation of the data infrastructure ecosystem. To see how we bring about an open, transparent, and secure digital ecosystem, we thus share a practical example and working code of the Gaia-X for the Notarization API. The aim of this product is to establish digital trust in disclosed data (paper or electronic) for Gaia-X participants to use in the Gaia-X ecosystem. To reach this goal, an issuance module to transform data into digital verifiable credential (VC) is...
Event Recording
Making SSI accessible: IOTA technology, solutions and projects
May 12, 2022
Traditional identity and access management solutions built so far on the trust for selected identity providers and their adoption from an ecosystem of identity owners and identity verifiers. The decentralized identity paradigm is disrupting these ecosystems and required more democratic collaboration and competition among a number of identity and credential issuers, identity owners, and verifiers selecting and using them. This requires not only to design and implement new technologies but also to identify new business opportunities and business models. Collaboration,...
Event Recording
Transatlantic SSI Interoperability: Building the Identity Layer for the Internet
May 12, 2022
Many decentralized identity infrastructures and ecosystems around the world are emerging, but how can we get to true global interoperability, where my digital identity works seamlessly across borders and across different use cases? Two of the most prominent initiatives in the digital identity space right now are 1. the digital Permanent Resident Card use case supported by the U.S. Department of Homeland Security, and 2. the European Blockchain Service Infrastructure (EBSI) with its various pilot projects. In this talk, we will look at the "Transatlantic SSI Interop" experiment...
Event Recording
Hybrid Central/Decentralized Identity: Deployment Strategies for SSI
May 12, 2022
The disruptive changes in the SSI paradigm will not be effortlessly adopted by the industry worldwide without technological enablers. Indeed, before transitioning to a fully decentralized ecosystem, standard enterprise IAM solutions and canonical IGA disciples will need to adapt and integrate verifiable credentials. This talk will explore the hybrid decentralization paradigm, offering pointers and insights into the uncontestable evolutionary needs of enterprises. After all, industry IAM solutions must evolve to include VCs issuing and verification capabilities to fully embrace the...
Event Recording
Access Control - The new Frontier
May 12, 2022
Event Recording
Creative Disruption: How Web 3 Models are Capturing Markets & Customers
May 12, 2022
Web 3 businesses are gaining traction. Data and metrics around customers and markets show growing usage, early adoption and huge growth potential. Currently, these businesses built on decentralized networks are separate from traditional web 2 platforms. Will the 2 paths converge? Will there be a bridge from web2 to web3 and how might that hybrid work? A few use cases will be discussed with points of view around how this convergence could work.
Event Recording
The Omniverse SWOT
May 12, 2022
Our headlines and podcasts are filled with the promise of web3. Positioned as a digital utopia that will foster and reward creativity whilst righting the wrongs of data equity. This new world, fusing our physical and digital – will be more immersive, collaborative and experiential than any technology we have known. However, along with the opportunities, it is already presenting new security, identity and privacy threats. This presentation will explore where we are on the road to the omniverse. Both the opportunities to strengthen digital rights and decentralise identity, along...
Event Recording
Global Trust Frameworks Interoperability
May 12, 2022
Event Recording
GAIN Insight
May 12, 2022
In this session, Daniel Goldscheider will give an overview on GAIN, the standards behind, and use cases. 
Event Recording
Panel | GAIN Interoperability
May 12, 2022
Event Recording
Panel | The Pieces of Modern Authorization - Whats Happening in the Market
May 12, 2022
Event Recording
Panel | IGA for Successfully Managed Identities
May 12, 2022
Event Recording
If it’s not Simple, Scalable and Agile, it’s not Modern IGA
May 12, 2022
Event Recording
Building Secure, Trusted and Interoperable Self-sovereign Identity with OpenID Connect
May 12, 2022
 
Event Recording
Self-Sovereign Identity for Legal Entities and their Representatives globally
May 12, 2022
Event Recording
Panel | PAM
May 12, 2022
Event Recording
PAM I^3 - Implementation, Integration and Intelligence about Privileged Access Management
May 12, 2022
A look at how 5 of Canada’s biggest financial institutions have tackled the challenge of Privileged Access Management.  Sharing similar requirements all went down paths of successful deployments of technologies to protect their clients, and workforce while providing a more efficient user experience for day to day activities.   A look at the 5 common steps to success.
Event Recording
PAM for the People
May 12, 2022
The cyberssecurity approaches and strategies that works well for a multinational with a large and well funded cybersecurity department may not be as applicable for a mid sized company where the security department may be a single person. Still if the partner company that delivers the cheese to a retailer falls to a cybersecurity attack there is simply no cheese to sell to the customers so the retailer not only looses money but also fails at their most basic task. So how do we as multinationals help our partners with implementing basic controls such as PAM in a way that works in...
Event Recording
Proofing your Success: Defining & Measuring Meaningful Metrics for IAM
May 12, 2022
Event Recording
Trimming down User Access Governance to its Essentials
May 12, 2022
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy. In the IAM market, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk. In this space, Elimity tries to break the status quo. As an innovator, Elimity provides a data-driven platform that specifically offers the essentials for user access governance: automated data collection, holistic risk analytics and user-friendly access reviews integrated with ITSM. As...
Event Recording
Cloud Security Standards: Expectations, Benefits and Use Case
May 12, 2022
Event Recording
Unified Endpoint Management: Practical Considerations
May 12, 2022
Event Recording
The Future of Digital ID in South Africa
May 12, 2022
Event Recording
Joni Brennan and Allan Foster
May 12, 2022
Event Recording
Progress and lessons on the establishment of Digital Identity in UK
May 12, 2022
Event Recording
Preserving Privacy in Identity-Aware Customer Applications
May 12, 2022
  As customer identity programs mature, they bring new opportunities and risks. In the rush to launch new customer experiences, personal data is over-exposed and over-replicated. The default is to ship all identity attributes, to all systems, on every request in order to make access decisioning easier for application developers. This approach disperses identity information across the application stack; which increases risks of data breach, data loss, and compromised identities. As a result, consumers lose trust and new business opportunities falter; or worse, customers like the...
Event Recording
Zero Trust and the Business – why you have to align with the application owners!
May 12, 2022
Event Recording
Challenges for Women in Identity and Security
May 12, 2022
It is well known that women face various challenges when working in the IT industry. These challenges lead to the fact that only about 20% of employees in IT are women. The situation in security and identity is even worse, as some studies have shown. "Women in Identity" is a global organization whose mission is to develop solutions with diverse teams. This presentation will look at the various WID initiatives on a global and local level that support women in the industry and create solutions “for everyone built by everyone”.
Event Recording
What if your digital twin misbehaves?
May 12, 2022
The concept of the digital twin comes originally from the Industry 4.0 domain with the idea of having a digital representation of real-life objects or processes. The representation of the digital twin consists of the physical object, the virtual product, and the connections between those. Data and its flow form the connection. Only recently has this concept been applied to people as well. While this concept is very promising for design or optimization scenarios, the fact that data is in the center of it, a missing overall data governance and security might be the next challenge. Thus,...
Event Recording
Quo vadis, SSI? – Self-sovereign Identity on route to production
May 12, 2022
Self-sovereign identity (SSI) has reached the in-between stage: more than a concept, not yet fully deployed. This is where the work can get the most gruesome and exhausting, but also the most creative and rewarding. While the dedicated W3C standards are reaching maturity levels, we see regulators and government actors jump on board and asking for even more stability across specifications and standards in order to establish real world systems. In fact, we see large pilot projects and implementation programs worldwide. One promising but equally critical development is the eIDAS 2 regulation,...
Event Recording
Making Digital Identity Enable Your Organization's Cloud/Digital Transformation
May 11, 2022
Event Recording
The Empowered Consumer and the Next Era of Digital Identity
May 11, 2022
Event Recording
A Story About Convenient Security
May 11, 2022
Event Recording
Promoting Cyber Resilience through Identity and Zero Trust
May 11, 2022
Resilience is defined as the dynamic process of encompassing positive adaptation within the context of adversity. Organizations today are under constant siege from any number of security threats. The only path to weathering this ongoing storm is to learn to intelligently adapt through the understanding of identity and the application of Zero Trust. In this presentation, we will illustrate how applying greater identity assurance and least privilege principles organizations can dramatically improve their overall cyber resilience.
Event Recording
Give me 10 minutes, I'll give you the truth about verified Identities
May 11, 2022
Event Recording
The strategic building blocks of the composable enterprise: Concepts & technologies
May 11, 2022
This session is a continuation of the opening keynote by Martin Kuppinger on the future Composable Enterprise. Together we take a look at what powers the composable enterprise and which concepts and technologies can contribute to building a composable enterprise. KuppingerCole proposes an engine that powers composable enterprises, made up of composable services, identities, and data. Since this journey towards becoming composable is intensely individual based on business goals and requirements, there countless ways of cultivating this modular trifecta. Therefore, this session identifies...
Event Recording
How organizations can make and save money with decentralized identity
May 11, 2022
In this talk John will present one way of modelling the potential value propositions for the parties (people and organisations) in decentralised identity models. Using real world examples of products and systems, he’ll use the model to consider their value propositions, and whether we need a “value exchange” ecosystem to enable the decentralised identity market to thrive.  Along the way the talk will consider the risk of false prophets and fake profits, where the residual value will remain,  as well as why (in John’s opinion) decentralised identity...
Event Recording
How to use the framework of a Trusted Data Ecosystem to simplify building decentralized identity solutions
May 11, 2022
Decentralized identity is an incredibly flexible technology that solves fundamental problems in the way we manage digital communication. But this capacity to do more than one thing at once  can be a source of confusion: How do I actually build a decentralized or self-sovereign identity solution today? How do I put all the components together?  In this session we use the framework of a Trusted Data Ecosystem to show how you can use decentralized identifiers, software agents, verifiable credentials, and the supporting infrastructure to verify data without having to check in with...
Event Recording
Demystifying CIEM for an Effective Multi-Cloud Security Enablement
May 11, 2022
As digital business pushes organizations towards an accelerated multi-cloud adoption, CIEM (Cloud Infrastructure Entitlements Management) emerges as a strong enabler for securing access and entitlements across an increasingly distributed cloud environment. Traditional PAM and IGA tools aren't natively designed to manage cloud infrastructure entitlements and therefore can't be easily re-purposed to discover and remediate excessive cloud permissions across multiple IaaS and PaaS platforms. The confusion arising from un-identically structured CSPs and misaligned cloud terminology is further...
Event Recording
Panel | Multi-Cloud Agility Must-Haves
May 11, 2022
With a highly prioritized digital tranfsformation towards a composable enterprise, it will be inevitable to work with multi-cloud solutions to achieve the level of agility and flexibility required. If it was to avoid vendor lock-in or to consequently go for best-of-breed solutions - in this cloud expert panel we will discuss approaches to manage multi-clouds efficently and to avaid increased complexity.
Event Recording
Security Improvement Through Visibility of Changes in Hybrid/Multi-Cloud Environments
May 11, 2022
Performing accidentally wrong or intentionally bad configuration changes by administrators, scripts or systems can lead to serious security vulnerabilities or unintentional visibility or leakage of data. This applies to on-premises systems, but especially to systems and applications in cloud environments. With a comprehensive change auditing and reporting in hybrid environments, such critical changes and conditions can be quickly identified and remediated. This session will deal with this topic in general and with a solution approach in particular.
Event Recording
Dissecting Zero Trust, a real life example
May 11, 2022
After his presentation on Strategic and Tactical approaches for Zero Trust, in this presentation Fabrizio will breakdown the components of a Zero Trust implementation and highlight what a company needs to implement it. Fabrizio will also cover use-cases like legacy or cloud-based applications.
Event Recording
Panel | The Stack, the Stack, the Stack: How Trust over IP is Enabling Internet-Scale Digital Trust
May 11, 2022
The internet was designed without a trusted identity layer to connect physical entities to the digital world. This layer is now emerging in the form of decentralized digital identity systems (aka self-sovereign identity or “SSI”) based on digital wallets and digital credentials.  What industry insiders have demanded for long is becoming reality. This is bringing challenges to the forefront including resistance of the identity establishment and major questions about interoperability between emerging and existing identity systems. The Trust over IP Foundation was...
Event Recording
Panel | Assessing the Cybersecurity Impact of Russia’s Invasion of Ukraine
May 11, 2022
Russia’s invasion of Ukraine has tectonic consequences for citizens and businesses across the world. An expectation of normalcy post the pandemic has been replaced with fears of increased gas prices and supply chain disruptions. Attackers are expected to leverage the context to carry out advanced cybercrime intrusions, leaving businesses susceptible to attacks that could have potential  second and third-order effects on their operations.  A cyber problem immediately becomes a business problem that requires effective business continuity contingency plans built around...
Event Recording
The Changing Cyber Threat Landscape and its impact on IAM (I)
May 11, 2022
Event Recording
From A to B - How Decentralized Technologies Are Changing Collaboration Between the Public and Private Sector
May 11, 2022
The world of modern urban mobility is full of - unused - opportunities. To get to their destination, people can use public transportation, take a cab or rent an e-scooter. But many options also means many providers. Anyone who uses more than one of the aforementioned forms of transportation to get from A to B will inevitably be confronted with a fragmentation of their journey. This is anything but smooth and user-friendly. A simple example makes this particularly clear: If Erika Mustermann has to go to London for a business meeting, she first takes the suburban train to the airport, then...
Event Recording
Panel | Digital Identity & Web3- Rethinking Business Models
May 11, 2022
Event Recording
Dealing with Multi-Cloud, Multi-Hybrid, Multi-Identity: Recommendations from the Field
May 11, 2022
Event Recording
The Role of Identity & Access Management for Ransomware Resilience
May 11, 2022
Event Recording
Identity in Polyglot Cloud Environments
May 11, 2022
Event Recording
Panel | Cloud Infrastructure Entitlement Management (CIEM): Managing Your Cloud Scale Risk with an Identity Defined Security Approach
May 11, 2022
CIEM adopts a zero trust approach to Identity and Access Management (IAM) for cloud infrastructures, making access risks visible and avoidable. In this panel session 
Event Recording
SASE vs. Zero Trust: Perfect twins or antagonists?
May 11, 2022
The concepts behind Zero Trust and SASE are not new, but recent developments in technological capabilities, changes in the way people are working, accelerated adoption of cloud and Edge computing, and the continued evolution of cyberthreats have resulted in both rising in prominence.    As organizations seek to improve their security capabilities, many are evaluating Zero Trust and SASE to determine whether to adopt either, one, or both.  Join this session to understand what each can potentially deliver and the exact nature of the relationship between...
Event Recording
Demystifying Zero Trust
May 11, 2022
“It’s about the journey, not the destination” they said. “It’s basically just Don’t Trust But Check, what’s the real difference?” they said. “ What’s the big deal?” They said. Zero trust has been the panacea to everyone’s security problems, for a really long time now, and yet we are still talking about it, and not just doing it. It’s no surprise that there is a certain level of cynicism then that zero trust was all marketing and no trousers. If 2021 brought us anything though, it was finally some clarity...
Event Recording
Zero Trust at Siemens: Where the impossible and the doable shake hands
May 11, 2022
Two years ago, Siemens started a still going on process to change its security architecture to Zero Trust. Not an easy task for a company that big, widespread, and divers in products. In this session program leads Thomas Müller-Lynch and Peter Stoll are talking about what  they mean when talking about Zero Trust at Siemens, what  everyone can learn from the approach Siemens is taking, and what they are planning as their next steps.
Event Recording
The Changing Cyber Threat Landscape and its impact on IAM (II)
May 11, 2022
Event Recording
Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization
May 11, 2022
Event Recording
Experience is What Counts, Orchestration is How you Get There
May 11, 2022
Event Recording
Reinventing the Network with Zero Trust to Stop External Network Attacks
May 11, 2022
Event Recording
What Ails Enterprise Authorization
May 11, 2022
Continued advances in authentication technology have made the "identity" part of "identity and access management" more manageable over the years. Access management on the other hand, is still very much a "wild-west" landscape. As enterprises move to a zero-trust network access model, access management is the only way in which attackers can be prevented from gaining unwarranted access to enterprise data. Attackers can include both malicious insiders and those using compromised identities. Numerous organizations have suffered significant financial damage as a result of such unwarranted...
Event Recording
OpenID SSE, CAEP and RISC - Critical standards that enable Zero-Trust security
May 11, 2022
Zero-trust security relies heavily on the ability for independently owned and operated services to dynamically adjust users’ account and access parameters. These adjustments are based on related changes at other network services, such as identity providers, device management services or others. A set of standards from the OpenID Foundation enable independent services to provide and obtain such dynamic information in order to better protect organizations that rely on zero-trust network access. These standards are being used today in some of the largest cloud-based services from...
Event Recording
What Supports Zero Trust in the Enterprise?
May 11, 2022
When we think of Zero Trust, we often discuss how it can support and improve your security posture, defense-in-depth strategies, and architecture -- but what supports Zero Trust? This discussion will focus on other IT / Security strategies, methodologies, and business practices that can help better position an organization to be successful in their approach to Zero Trust. 
Event Recording
The Path to Zero Trust by Securing Privileged Identities
May 11, 2022
Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity within your organisation has never been more important as it is the foundation of a successful Zero Trust implementation. Zero Trust is built on foundations that are essential across your cybersecurity strategy, delivering greater value from existing cyber investments. In this session, we will outline: Why protecting identities is fundamental to achieving Zero Trust Practical steps you can take NOW to secure your privileged identities...
Event Recording
Plan A: Reduce Complexity in your Cloud Native Environment (there is no Plan B)
May 11, 2022
Organizations with an advanced cloud migration program have hit a roadblock. TO successfully navigate the adoption of compartmentalized code, in order to reap the benefits of improved agility and reduced costs, The CISO must embrace automated deployment and gain control over APIs.
Event Recording
Panel | Introducing Open Policy Agent (OPA) for Multicloud Policy and Process Portability
May 11, 2022
With over 120 million downloads, and users like Netflix, Zalando and GS,  the open source project Open Policy Agent has quickly become the de facto standard for Authorization. In this session, KuppingerCole´s Alejandro Leal will discuss with  Jeff Broberg, Gustaf Kaijser and Ward Duchamps on most common use cases where OPA is adopted.  
Event Recording
Certificate Based Authentication in a Cloud Native Environment - a Migration Journey from Handcrafted XML Signing to OpenID Connect
May 11, 2022
During this best practice session we will present you with hands-on experience from one of our financial services industry customers. The company used a handcrafted xml signature mechanism to authenticate their business partners when initiating machine-to-machine communication to exchange data between data centers. When the customer decided to migrate to REST APIs in a cloud native setup, the existing mechanism was no longer fit for purpose. Together, we designed a solution to keep the benefits of certificate based authentication while establishing an interaction model conforming to the...
Event Recording
OAuth DPoP (Demonstration of Proof of Possession): How to Not Let Attackers Steal your OAuth Token
May 11, 2022
Most OAuth deployments today use bearer tokens – tokens that can be used by anyone in possession of a copy of them, with no way to distinguish between legitimate uses of them and those that stole them and used them for nefarious purposes. The solution to this is proof-of-possession tokens, where the legitimate client supplies cryptographic material to the issuer that is bound to the token, enabling it to cryptographically prove that the token belongs to it – something attackers cannot do because they don’t possess the proof-of-possession cryptographic material. The...
Event Recording
Trends in Enterprise Authentication
May 11, 2022
Event Recording
Panel | The Future of Authentication
May 11, 2022
Event Recording
European Identity & Cloud Awards Ceremony
May 11, 2022
Once again, analysts from KuppingerCole come together to showcase outstanding Identity Management and Security projects, standards and people. The winners will be honored live on stage during the award ceremony.
Event Recording
SSI Market Size (and opportunity in web3.0) and use cases
May 11, 2022
Who is this new beast, which widespread technology is going to be used everywhere from banking to metaverse, travel to healthcare? The technology that has no limits in its application across sectors is equally welcome in centralised and decentralised worlds. Meet, self-sovereign identity (SSI). How do you quantify the impact of a paradigm which will completely transform how we interact with identity and more broadly, authentic or trusted data? Our estimates say its market size is $550b / $0.55Tr. We’ll give a brief rundown of SSI applications across Finance, NFT,...
Event Recording
The CASE for a Vehicle Lifecycle Ledger
May 11, 2022
Mobility-as-a-service is changing the way people move. From mobility based on driving your own car, it is converging to the consuming of various services using multiple modes of transportation. Ranging from eScooters, bicycles, ride-sharing to car-sharing, ride-hailing and public transport.
Event Recording
Identity Ecosystems for a Better Customer Experience
May 11, 2022
Portable, verifiable and, most importantly, reusable representations of personal data can enable high-touch, high-trust and low-cost engagement between customers and networks of complementary service providers. The EU is already adjusting to the opportunities of Self-Sovereign Identity, but the private sector needs to demonstrate more high-value use cases in order to force beneficiary regulations and an enabling environment for the technology. The tools and techniques of Self-Sovereign Identity (SSI), including the no-code capabilities provided by ProofSpace, can be used to create trust...
Event Recording
The 'Credentials-first Mobile-first' Identity Ecosystem
May 11, 2022
This is a new development in the world and touches on mDL, Verifiable Credentials, decentralized identity, and personal data topics. A forward-looking presentation about what the world might look like, the foundational changes represented by this change, and some current and potential innovations that are now possible because of this.
Event Recording
Cardea: verifiable credentials for health information go open source
May 11, 2022
As an incubator for innovation in air travel, Aruba has chosen to use verifiable digital credentials to manage entry requirements and health testing for travel to the island. This decentralized, open-source technology, which provides secure authentication while preserving traveler privacy, was developed by SITA and  Indicio.tech  and donated to Linux Foundation Public Health as  Cardea. In this session, representatives from Aruba’s government, Indicio, and SITA will discuss why they chose a decentralized approach, how they created a trusted data...
Event Recording
Drone Pilot Credentialing for Air Safety
May 11, 2022
Drone operations are estimated to bring €10bn/yr to the EU economy by 2035. A critical e-Government issue is the ability to fly drones in regulated airspace around airports. Unauthorised drone operations in the flightpath of passenger aircraft can endanger lives and cause huge financial loss for airport operators. Heathrow Airport has invested >£10M in security systems to track and destroy unauthorised drones. Digitising the entire drone flight approvals process will involve many steps, but the major one we are addressing is verifying pilot training credentials....
Event Recording
The Digital Identity Shake-up we’ve been waiting for: How to Survive, and how to Thrive
May 11, 2022
 
Event Recording
A Key Milestone towards CBDC Wallets - The eIDAS 2.0 Payment-Authorising Wallets
May 11, 2022
The presentation to be made by Stéphane Mouy (SGM Consulting - France) and Michael Adams (Quali-Sign - UK) will focus on the forthcoming eIDAS 2.0 digital identity wallets (DIWs) and the payment use case. DIWs will allow users to share high LoA identity and status credentials to various relying parties, including financial institutions, as well as meet applicable strong customer authentication requirements for payments. The payment use case is of critical importance to eIDAS 2.0 digital identity wallets and promises to be transformational for EU payment service providers as it...
Event Recording
We’re Gonna Need an even Bigger Boat: How Pervasive Digital Transformation, Nation State Actors, and Open Code Repositories Mandate a Reinvention of Identity
May 11, 2022
Event Recording
Key Requirements for Next Generation MFA
May 11, 2022
In this talk you will learn how MFA can be a foundation for your Zero Trust Initiative
Event Recording
What Does It Mean to Package Ethics Into a Technology Stack?
May 11, 2022
Event Recording
The Value Paradox: The 3 Inflections of IGA
May 11, 2022
Event Recording
A Learning Agenda for Federal Identity
May 11, 2022
Event Recording
IAM 2025: Integrated, Agile, Flexible. Decentralized?
May 11, 2022
Times are challenging, probably more than during the last few decades, with a pandemic that seems to never ending, homeoffice workers who don´t want to return, some frightening growth rates on the dark side of digital with ransomware everywhere and nation-state intellectual property theft on a broad level. We therefore have to update and modernize our identity & access programs to meet chose new challenges and enable an agile & composable business. Identity proofing through global identity networks, risk mitigation of a workforce that remains at the home office, and all...
Event Recording
Panel | Identity Fabrics: The Mesh and the Factory for Identity Services
May 11, 2022
Identity Fabrics as a concept has established itself as a common paradigm for defining and implementing the identity services needed by organizations to provide seamless, yet secure and controlled access of everyone and everything to every type of service, regardless whether its legacy or shiny & bright SaaS, and regardless of where it runs. Identity Fabrics support the shift-left in IAM thinking from only managing applications to providing a consistent set of identity services for the developers of digital services. Identity Fabrics deliver the integration and control plane required...
Event Recording
IAM-Suites for Medium-Sized/Mid-market Organizations
May 11, 2022
Event Recording
Panel | Centralized vs. Decentralized: Pros, Cons, Use Cases
May 11, 2022
Event Recording
The ICaaS (Identity Component as a Service) approach for taking control of customer experience
May 11, 2022
Event Recording
Denmark's 2022 brand new eID solution
May 11, 2022
Event Recording
The Importance of a Centralized Access Management System
May 11, 2022
Event Recording
Panel | Deliver on the Promise of an Identity Fabric: The Power of Data
May 11, 2022
Digital identities of consumers, customers, business partners, employees, but also devices, things, or services are at the core of the digital business.  Unfortunately, most digital identities reside in siloes. Building a modern Identity Fabric that delivers seamless yet secure and controlled access from everyone and everything to every service requires breaking down the legacy identity siloes, and building a modern, flexible, identity data foundation.
Event Recording
Building a robust CIAM foundation, fit for the dynamic financial market
May 11, 2022
As organizations are recovering from the pandemic, many of them embark on a digital transformation at high-speed. Investments to drive online business, powered by customer insights and an attractive user experience, yet secure and compliant to rules and regulations, have never been bigger. NN, an international financial services firm with over 15,000 employees, is changing from a traditional insurance firm into a modern and online financial services firm that focuses on frequent and valuable customer interactions. NN is providing these online...
Event Recording
Implementing Multi-Region Identity Identifiers and IAM
May 11, 2022
Event Recording
Siemens AG: Real-World Enterprise IAM at Scale
May 11, 2022
In today´s unpredictable business environment where change is the normal, it has become critical to have a manageable and scalable Identity & Access Management program in place. In this Best Practice Presentation, Leonardo Morales will talk about the challenges and his learnings from implementing state-of-the-art IAM at Siemens AG, and what the next steps will be.
Event Recording
Practicalities of Identity Proofing for Authentication
May 11, 2022
Event Recording
A Blueprint for Achieving a Passwordless Reality
May 11, 2022
Password-related attacks increased by a staggering 450% in 2020, with over 1.48 billion records breached worldwide. Meanwhile, the average cost of a password reset exceeds $50 USD. We all know that passwords fail to deliver adequate Zero-Trust security and cause unnecessary friction for both customers and the workforce. So why have passwords not receded into the background? What are the key challenges facing enterprise passwordless agendas? And how can modern identity and access management help us realise a blueprint for a passwordless reality? 
Event Recording
Panel | MFA usage in enterprise
May 11, 2022
There are so many ways enterprises could benefit from using Multi-Factor Authorization (MFA). Benefits include identity theft prevention, secure devices, lower breach risks, to name just a few. But why are so many businesses still not using MFA? Perhaps because it is too complex and time-consuming for IT departments? In this panel, our security leaders will try to clear up any misconceptions there seem to be about implementing MFA in the enterprise.
Event Recording
The State of Passwordless Authentication
May 11, 2022
The FIDO Alliance has made tremendous strides in its mission to change the nature of authentication with stronger, simpler and passwordless authentication. Join this session to get find out the state of passwordless authentication from the FIDO lens, including a sneak peak at major news that will – finally - make passwordless FIDO authentication available to the masses.
Event Recording
Fraud Reduction Intelligence Platforms - an Overview
May 11, 2022
Event Recording
Panel | Overcoming SMS OTP: Secure passwordless MFA with your mobile phone
May 11, 2022
Event Recording
Why KYC Isn’t Enough
May 11, 2022
Event Recording
Panel | Best Practices for Implementing Zero Trust
May 11, 2022
The “zero trust” approach to cybersecurity has been gaining momentum in recent years, as both corporations and government agencies have struggled with how to enhance security given the de-emphasis on the network perimeter. For the most part, the zero trust movement has remained rooted in network principals. However, in the last two years, much of the world was forced to interact exclusively online, creating a sense of urgency around zero trust security and the “never trust, always verify” philosophy behind it reached a new level of...
Event Recording
SSI, NFTs, ENS & Co - Trends and Adoption of Decentralized Identity in 2022
May 11, 2022
Goal of this Deep Dive: Listeners will leave with a solid understanding of different approaches to decentralized identity like Self-Sovereign Identity (SSI) and Non-Fungible Token (NFTs), Ethereum Name Service (ENS) their adoption (based on real use cases) their impact on web2/3. Main Contents / Flow: The new status quo: The broken web and the shift from data silos to ecosystems. The rise and latest trends in Web3: On-chain identity, NFTs, ENS & Sign-in with Ethereum Comparing paradigms: What is better, NFTs or SSI? Adoption & real-life use cases...
Event Recording
Welcome to EIC 2022
May 10, 2022
Event Recording
Identity. Security. Decentralized. The Future of IT in the Age of Change
May 10, 2022
The future of the enterprise is changing. In the Digital Age, much is different than it has been in the past. The focus must be on agility in business models and delivery, innovation, and reliability in delivering to the customers. This requires a shift in focus, in all areas, including IT. IT must focus on enabling the business to deliver digital services that stand out from the competition, with leading-edge customer experience. IT must be able to adapt to change in competition as well as in technology, and to support the continuous innovation of businesses in the digital age. It must...
Event Recording
Future Government: Transforming Public Services to Be More Agile and Innovative
May 10, 2022
Event Recording
Advocating for Decentralised Identity in Europe: 7 Lessons Learnt
May 10, 2022
Event Recording
Model, Measure, Manage - The Journey to Autonomous Security in a Hybrid Multi-Cloud World
May 10, 2022
We cannot manage what we cannot measure.
Event Recording
Digital Identity and Privacy: Stories from the Frontline
May 10, 2022
As the pace of digitalization gathers momentum, organizations are witnessing a dramatic increase in the number of digital identities. These identities interact with systems and applications relentlessly to perform day-to-day IT tasks. Nevertheless, maintaining the privacy of this data is a daunting task. Enterprise data is hosted in multi-tenant cloud, managed service providers and distributed data center environments. How an organization can maintain data privacy in this evolving IT access control use-cases depends on the level of preparedness to protect and monitor those digital...
Event Recording
Dynamic Authorization in Zero Trust Architecture
May 10, 2022
Event Recording
New Face, Who Dis? Privacy vs Authentication in a World of Surveillance
May 10, 2022
Facial recognition technology is evolving rapidly, presenting the benefits and dangers that innovation always does. Will it provide reliable biometric authentication, or will it erode personal privacy? We’ll examine the current landscape from both a policy and a technical perspective, and discuss the responsibility of government, enterprise, and individuals in this complicated environment, and review the latest adversarial research that attempts to enhance biometric privacy for individuals.
Event Recording
Pre-Conference Workshop | The IAM Experience Your Users Really Deserve
May 10, 2022
Organisations that are being targeted by SaaS and B2B companies might struggle when it comes to building a smooth and quick process of authentication for their users. Issues with business needs, such as user organisation within a specific target business, separate branding, access control and SSO are spreading like wildfire. Therefore, some of these processes could overwhelm your IT-team with unnecessary burdens, such as building an application entirely from scratch reducing significantly the time dedicated to the design and improvement of the app itself. Join us in this hands-on...
Event Recording
I'm None of your Business
May 10, 2022
Event Recording
Privacy and Data Protection. What is this Thing Called Privacy?
May 10, 2022
Event Recording
CISO Panel | Securing the Composable Enterprise
May 10, 2022
As if it all came together on the foundations of an agile, fully decentralized enterprise, embracing the API economy to deliver results through assembling and combining pre-packaged business capabilities. AI-driven, automated, everything delivered on-demand, providing the best possible user experience, and all that at an unprecedented pace that keeps us ahead of the ever-increasing speed of change: The composable enterprise. But wait – less than a third of businesses that we at KuppingerCole have asked recently, say that they have processes, staff, structures, skills, and...
Event Recording
The New Digital Identity Wallet for all Europeans: Latest Amendments
May 10, 2022
An impactful 73 pages proposal for amending the 2014 e-IDAS regulation was made in June last year, a.o. providing EU wide wallets for national e-ID’s. Market consultations and impact assessments have been concluded early 2022 and the European Parliament discussed the proposal with experts answering questions parliamentarians had, not without arousing quite some dust. The EU Digital ID Proposal is powerful, as it is creating a Pan-European wallet for all member states, trying to stay in line with all existing ID initiatives and legislation. Drs. Jacoba Sieders will give you insight...
Event Recording
Journey to the North: Canadian Perspectives and Progress on Digital Identity
May 10, 2022
Event Recording
It's the Relationship, Stupid
May 10, 2022
Event Recording
Privacy: The Real Cost
May 10, 2022
Privacy is one of the most challenging aspects to protect in identity solutions. The entities that stand to gain the most from surveilling users can use convenience as a bargaining chip. Users understand and appreciate convenience, but they often don't appreciate the costs of loss of privacy, as the consequences often play out well after the violation occurred. Identity practitioners often take the need to preserve privacy for granted, and in so doing fail to help users and solution designers understand the concrete impact privacy violations can have on the lives of users. This...
Event Recording
Pre-Conference Workshop | Standards Matter. Trustworthy use of Identity and Personal Data
May 10, 2022
The world has changed because of COVID. More fraud is taking place. More misuse of identity is occurring. To combat the rise in fraud and to mitigate risk, the Kantara Initiative offers a 3rd party conformity assessment program.
Event Recording
Pre-Conference Workshop | How OpenID Standards are Enabling Secure & Interoperable Digital Identity Ecosystems
May 10, 2022
OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while also enabling a collaborative platform to openly address current trends and market opportunities. The OpenID Foundation Workshop at EIC includes a number of presentations focused on 2022 key initiatives for the Foundation.
Event Recording
Tribute to Kim Cameron: Privacy & the 7 Laws of Identity
May 10, 2022
Last November, the creator of the 7 Laws of Identity, Digital ID thought leader and focal point of a Global Identity Community, Kim Cameron, passed away. He not only left us with an uncountable number of unforgettable moments. He also left us with those 7 laws of Identity, a set of fundamental principles that have helped shaping modern privacy legislation and which are more relevant today as ever before. In this keynote session, 7 of Kim´s friends, colleagues and co-founders will talk about today´s relevance of Kim´s work. The session will be moderated by Jackson Shaw who...
Event Recording
Pre-Conference Workshop | IAM, the Cloud, and GDPR - Why you will fail on GDPR without a strong IAM posture
May 10, 2022